Specify traffic to
be forwarded for analysis based on the application in use, the file
type detected, links contained in email messages, or the transmission
direction of the sample (upload, download, or both). For example,
you can set up the firewall to forward Portable Executables (PEs)
or any files that users attempt to download during a web-browsing
session. In addition to unknown samples, the firewall forwards blocked
files that match existing antivirus signatures. This provides Palo
Alto Networks a valuable source of threat intelligence based on
malware variants that signatures successfully prevented but has
not been seen before.